AP Cybersecurity Unit 1

0.0(0)
studied byStudied by 3 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Eavesdropping

Occurs when a hacker intercepts data that is transmitted between two devices.

2
New cards

On-Path Attack

Type of cyberattack where the attacker

positions themselves between two

communicating devices to intercept and

potentially alter their communication.

3
New cards

Credential Harvesting

Type of malicious activity where threat actors

steal login information (usernames

and passwords)

4
New cards

Injection

Occur when attackers exploit vulnerabilities in

an application to inject malicious code into a

system.

5
New cards

Dos/DDos

Dos attack uses a single source to overwhelm a system with traffic, while a Distributed Denial of Service (DDoS) attack uses multiple sources (a botnet)

6
New cards

Reconnaissance

The attacker researches about their target — like names, emails, or systems — often using publicly available sources called open source intelligence.

7
New cards

Initial Access

They find a way into the system, often by tricking someone or using weak or stolen passwords.

8
New cards

Persistence

The attacker sets up a way to keep getting in, even if the system restarts or passwords change.

9
New cards

Lateral Movement

They move around the network, trying to reach more valuable parts or gain higher-level access.

10
New cards

Taking Action

The attacker does what they came to do — steal data, shut things down, or cause damage.

11
New cards

Evading Detection

They try to cover their tracks by deleting logs or hiding files so no one knows they were there.

12
New cards

Script Kiddies

low skilled adversaries who rely on malicious code and tactics developed by others. They are typically motivated by money and a desire for recognition.

13
New cards

Hacktivists

adversaries who are motivated by a cause, such as the environment or social causes. They believe that their end goal justifies their illegal methods.

14
New cards

Insider Adversary

an adversary who is a member of the organization being attacked.

15
New cards

Cyberterrorists

adversaries who are motivated by politics or beliefs and seek to launch cyber attacks that disrupt an entire community, region, or nation. They can act independently or on behalf of a government or criminal organization.

16
New cards

Transnational Criminal Organizations

adversaries that seek financial gain primarily through the deployment of ransomware and by stealing corporate intellectual property and selling it in illegal markets.

17
New cards

State Adversaries

adversaries that are employed by a government to carry out cyber attacks to achieve its strategic aims.

18
New cards

Pretexting

The attacker invents a believable scenario or identity to trick the target into revealing sensitive information.

19
New cards

Authority

The attacker pretends to be someone in a position of power to pressure the target into following instructions.

20
New cards

Intimidation

The attacker uses fear, threats, or consequences to coerce the target into acting quickly or giving up information.

21
New cards

Consensus

The attacker suggests that others have already agreed or participated to make the target feel social pressure.

22
New cards

Familiarity

The attacker builds false trust by pretending to be someone the target knows or shares something in common with.

23
New cards

Scarcity

The attacker claims that something is in short supply to make the target feel they must act before it’s gone.

24
New cards

Urgency

The attacker pressures the target by creating a fake deadline or emergency to prompt quick, uncritical action.